Sunteți pe pagina 1din 5

Performance Analysis of Ad-Hoc On-Demand

Distance Vector (AODV) and Dynamic Source


Routing (DSR) Under Black Hole Attacks in
Mobile Ad Hoc Network (MANET)
Ida Nurcahyani, Helmi Hartadi
Electrical Engineering Department, Universitas Islam Indonesia
Jalan Kaliurang KM 14.5, Yogyakarta, 55584 Indonesia
Email: ida.nurcahyani@uii.ac.id, helmihartadi@gmail.com,

Abstract—MANET consists of a collection of nodes which addressed [3] Each node in the MANET network is an ad hoc
dynamically can be made anywhere without using a fixed network which is always moving so that it affects the MANET network
infrastructure such as a base station so that MANET becomes because of its changing properties along with the movement
vulnerable to network attacks. The black hole attack is one of
several types of attacks that occurs in MANET. A black hole of the node. As each node is a free-moving router, the proper
attack is an attack that causes packets around the attacking MANET network protocol is essential to help nodes sending
node to disappear as of the network loses several information data quickly and more efficiently.
and can reduce its performances. Choosing the right routing The dynamic MANET network makes it very vulnerable
protocol is one of the efforts to minimize the impact of black to attacks that occur from within and outside of the network.
hole attacks in MANET. This study was done to compare which
is better between AODV and DSR routing protocol during black There are several types of attacks on the MANET network, one
hole attack in MANET. From the simulation results, the AODV of which is a black hole attack. The black hole attack works
routing protocol shows better values compared to DSR routing by taking a packet that passes on the node around the black
protocol from several QoS parameters such as throughput, delay, hole node, then the packet will be discarded. Black hole nodes
and packet loss; either before being hit by black hole attacks or place themselves in the midst of sending packets between the
after being hit by single black hole and collaborative black hole
attacks. sending and the receiving nodes. Black hole attacks can easily
enter the network because the attack mechanism is simple and
I. I NTRODUCTION it can have a negative impact on the network.
A study that compares the performance of Ad-Hoc On-
Mobile Ad hoc ad-hoc Network (MANET) consists of a Demand Distance Vector (AODV) and Dynamic Source Rout-
set of wireless device points (nodes) that are dynamic and ing (DSR) protocols in MANET has been carried out by [4].
temporary without using an existing network infrastructure The results of this study indicate that AODV protocol has a
such as a base station. The MANET network does not require better throughput value than DSR. However, AODV routing
infrastructure that uses large costs; therefore, there is no protocol shows longer delay due to rerouting when a link was
need to construct physical communication networks in places broken compared to DSR protocol. Another study comparing
where the infrastructures are difficult to build such as on the the performance of AODV and DSR routing protocols was
battlefield, in natural disasters area, forests, and oceans [1]. done by [5]. The node formation used in this study was
Each node on the MANET network not only functions random with the scenario of increasing the number of nodes.
as a host but can also function as a router to forward data The simulation results using Network Simulator 2 (NS2)
packets from one device to another. In ad hoc networks, show that the AODV routing protocol shows better results
the route between nodes on an ad hoc network is multihop; than the DSR routing protocol. Moreover, the DSR routing
thus, communication between nodes utilizes other nodes as protocol had lower Quality of Service (QoS) values when the
intermediaries if the direct communication range is outside number of nodes is increased. Meanwhile, a study of black
the communication destination node [2]. Ad hoc is a simple hole attacks detection on MANET networks was done by [6],
wireless Local Area Network mode because it does not require where detection and intervention of the black holes attacks are
an access point. Each host has a transmitter and receiver to done by using the AODV routing protocol. The author uses
communicate directly. the scheme to increase the number of nodes and utilize the
The routing protocol is a standardized setting of a node to previous routing table by adding isolation information to the
forward packets from one node to another. On the MANET nodes that have been affected. A.A. Chavan [7] et al analyzed
network, each node is a router that determines the route to be AODV and Destination Sequenced Distance Vector (DSDV)
978-1-5386-6670-8/18/$31.00 2018
c IEEE routing protocol performances during black hole attack. In this
paper, simulation was done by increasing number of nodes that
involved in data transmission.
Black hole attacks on the MANET network are proven to
reduce network performance in terms of the QoS [8]. Previous
studies [4]– [6] show that the AODV protocol has advantages
over DSR routing protocols. However, in black hole attacks,
the AODV protocol performance decreases when it is hit by a
black hole attack. Nevertheless, apart from AODV and DSDV, S: Source
D: Destination
other networks have not been tested for their routing protocols
performance in black hole attacks. Therefore, this study aimed
Fig. 1. AODV routing scheme
to analyze the impact of black hole attacks on the AODV and
DSR routing protocol on the MANET network. The analysis
was done before and after being hit by single and collaborative Routing loops can be defined as the conditions when a packet
black hole attacks to show how much black hole attacks that is transmitted on a route never reaches the destination.
affecting the performance of both routing protocols. In AODV, if there is a packet delivery request to a node, the
This paper is organized as follows. Chapter 2 provides a RREQ packet will be distributed to the surrounding nodes. If
brief description of the functions and mechanisms of routing the node receiving the RREQ packet has information of the
protocols as well as an explanation of black holes attacks on route to the destination node, the node will reply by sending
MANET networks. Meanwhile, Chapter 3 explains the system the RREP packet to the source node as in Fig. 1. However, if
that was built and the parameters used to simulate the MANET the node doesn’t know it, the RREQ message will be broadcast
network with and without black hole attacks. Chapter 3 also again by the node to the surrounding nodes after the hop
presents graphs and analysis of simulation results. Finally, counter value is added.
Chapter 4 provides the conclusions of the paper. In AODV, nodes use sequence numbers to keep correct in-
formation of reverse paths leading to the source node. Reverse
II. MANET ROUTING P ROTOCOLS
path is formed when RREQ goes through the intended node,
A routing protocol is standardization of node settings for where each RREQ will be identified from the surrounding
route search. MANET routing protocols are classified into nodes that sent the RREQ earlier. When the destination node
three, namely reactive, proactive, and hybrid [9]. This study has the route information and receives the RREQ packet, the
compared the protocols from the reactive class, namely AODV sequence number value in RREQ will be compared. If the
and DSR. Proactive protocol routing works by flooding nodes sequence number value in RREQ is greater than the value in
that are connected to information regarding their neighbors. the receiving node, then the RREQ packet will be forwarded
Proactive routing protocols store routing information and to the surrounding node. In contrast, if the sequence number
maintain it up to date, by exchanging packages to neighbors. value on the receiving node is the same or greater than the
Examples of proactive protocols are DSDV, OLSR, WRP, value in RREQ, then the RREP packet will be sent by the node
and others [10]. Meanwhile, reactive routing protocol works to return to the source node using the reverse path that was
only when there is a node that requests to find the route to created previously. Thus, the function of the Reverse Path is
the destination. This reduces the overhead that occurs in the to enable the destination node to reach the source node, which
proactive protocol. Examples of reactive protocols are AODV, will be used as a route for sending data packets [13].
DSR, and others [9]. The hybrid class protocol works by Furthermore, if the route has been formed, then the source
combining the advantages of reactive and proactive classes node is responsible for maintaining the route. If there is an
[11]. error in the future, the Route Maintenance will send the RERR
packet to the damaged node and to all the nodes in the network
A. Ad-Hoc On Demand Distance Vector (AODV)
until it is back to the source. AODV routing protocol can
AODV is one of the reactive protocols in MANET that adapt to its changing node formation dynamically. Moreover,
works according to demand. In AODV, the route from one the routing head size of this protocol is small so that the
node to another will be created if the source node wants the bandwidth can be used efficiently [14]. Still, because AODV
packet to be sent to the selected destination node. Nodes in routing protocol only creates route table based on request, not
AODV will store the routing table for only one destination periodically, the transmission of a new node with different
node for one route [12]. In AODV routing, if the route is not topology will result in longer delay [14].
used at the specified time, the route will be removed from the
routing table. The route search process on AODV is divided B. Dynamic Source Routing (DSR)
into two types, namely, route discovery and route maintenance. DSR is also one of the few reactive routing protocols
Route discovery uses two packages, Request Route (RREQ) available like AODV. DSR has a few similar mechanisms with
and Route Reply (RREP). Meanwhile, Route Maintenance AODV. DSR uses two mechanisms to connect routes by Route
using the Route Error (RERR) package. To generate a routing Discovery and Route Maintenance using the RREP, RREQ,
loop-free route, AODV uses the sequence number feature. and RRER packages.
S: Source
RREQ
S: Source
D: Destination D: Destination Fake RREP

Fig. 2. DSR routing scheme Fig. 3. Black hole attack

One of the differences between DSR and AODV is that In this way, the source node will reject the RREP packet
the DSR route selection is based on the source node. DSR from another node that has replied to the RREQ packet, even
does not have a periodic messaging feature like AODV. DSR though the reply route is the correct one. Therefore, the route
has a Cache Memory feature that functions as a storage for between the source and the attacker will be formed and then
all routing information available on the network. The cache the packet will be discarded by the attacking node [13]. The
memory makes the process of network recovery easier if the illustration of the black hole attack is shown in Fig. 3.
network topology changes suddenly. DSR no longer needs to
route discovery if there is a topology change. DSR only needs III. S IMULATION AND A NALISYS
to find the route available in the cache memory that stores In this study, the performance of each protocol was assessed
routing information [14]. by making several different scenarios. The first scenario was
The route search mechanism on DSR is nearly similar with in the form of default settings when the node had not been
AODV, that is, if the source node wants to send data but hit by a black hole attack. The second scenario was when the
does not have information of the route to be passed, DSR second routing protocol was hit by a black hole attack. Finally,
will start the route search process by distributing the RREQ the last scenario was when the MANET network was hit by
packet to its nearest node. The RREQ package sent contains a black hole from a collection of attacker nodes that formed
the sender’s address and destination. The nodes that receive the collaborative black holes. Fig. 4 shows the MANET topology
RREQ packet will store information of the path into the cache with 3 colaborative attacks.
memory. If a route has been found, the node will send the
RREP packet to reply to its original route. The RREP package
is sent using the Reverse Path line that was formed when
sending the RREQ package. The route search process on DSR
can be seen in Fig. 2. DSR protocol is able to provide routes
with many paths and minimize route maintenance process that
usually should be done continuously [14]. Nevertheless, due to
its use of cache memory in storing paths, this protocol cannot
withstand too much additional network load [14].

C. Black Hole Attack


Black hole attack is one of the attacks that can occur on
the network. Black holes work by absorbing packets around
the attacking node, after which they reply with a fake RREP
packet and then throw it away. Black hole attacks are divided Fig. 4. Network topology with collaborative attacks
into two types, namely attacks that are only carried out by one
attacking node and collaborative black hole attacks carried out For the scenario without black hole attacks, each routing
by more than one node working together [15]. protocol (AODV and DSR) was tested with predetermined
In black hole attack, the attacking node tells the source node parameters. Scenario 1 used the usual settings for both routing
that the attacking node has the shortest route to the destination protocols. Each routing protocol was tested with nodes totaling
node. When the attacking node receives the RREQ packet, 30 nodes + 1 server.
then it immediately sends a fake RREP packet to the source Meanwhile, the scenario with black hole attacks was divided
node. The attacking node does not check information of the into 2 parts. The first part was a black hole single attack
destination node. The attacking node also states that it is the scenario while the second part was a collaborative black hole
node with the shortest and newest route by manipulating RREP attack that involved three nodes that become black holes in
and sending the wrong hop count [6]. the network. Table I shows the specification of the scenarios
TABLE I
S IMULATION PARAMETERS

Parameters Scenario 1 Scenario 2 Scenario 3


Area 1 km2 1 km2 1 km2
Normal node 30 nodes 29 nodes 27 nodes
Black hole node 0 node 1 node 3 nodes
Data rate 11 Mbps 11 Mbps 11 Mbps
Node mobility Random waypoint Random waypoint Random waypoint
Aplication FTP FTP FTP
Application traffic high load high load high load

250 3.5
216.14 3.072
207.33
197.9 3
200 2.521
Throughput (kbit/s)

2.5 2.246

Delay (ms)
150
2

1.5
100
73.42 70.18 64.75
1 0.719 0.718
0.623
50
0.5

0 0
Scenario 1 Scenario 2 Scenario 3 Scenario 1 Scenario 2 Scenario 3

AODV DSR AODV DSR

Fig. 5. Throughput results Fig. 6. Delay results

without and with black hole attacks on the MANET network B. Delay analysis
for AODV and DSR routing protocols. The comparison of the delay results in all scenarios are
shown in Fig. 6. As can be seen in Fig. 6, the average delay
A. Throughput analysis in the AODV protocol was smaller than the DSR, which
Fig. 5 shows throughput results of the simulation. In terms means that the DSR protocol required a longer time in packet
of throughput, AODV and DSR routing protocol had the ability delivery. The high delay in DSR was related to the DSR route
to transmit different data. In AODV, in the no attack scenario, search that is based on Source Routing, which makes it has a
the throughput was 216.14 bit/s while the DSR only had 73.42 longer delay compared to the AODV protocol. However, the
bit/s. This was caused by several factors. One reason why DSR can still be categorized in the excellent category [16].
the DSR protocol had a lower throughput was that it uses When the MANET Network was given a single and collab-
the Source Routing mechanism when searching for the route, orative black hole, the two routing protocols gave nearly the
which makes the route search longer and affects its throughput. same response. When the attack occurs, the performance of
The second reason was the AODV uses periodic messages on the network became unstable, especially the delay parameters
nodes that have formed a route to maintain its route; thus, the became erratic. This was caused by the black hole node tried
AODV has greater throughput than DSR. to hold the packet at a certain time and then released it in a
In a single black hole scenario, the throughput of the AODV certain time too. This affects the latency of the two routing
routing protocol decreased by 4.25% while the DSR protocol protocols to fluctuate.
experienced a slightly different decrease of 4.62%. This was
caused by the influence of the malicious Black Hole node C. Packet Loss analysis
that makes the MANET network become unstable due to the As can be seen in Fig. 7, in the no attack scenario,
absorption process and the disposal of packages carried out by both routing protocols experienced a very small packet loss.
the black hole nodes and resulting in decreased throughput. However, in the single or collaborative black hole attack,
Meanwhile, in the collaborative black hole attacks sce- packet loss occurred in both protocols. Packet losses in the
nario, there was a significant throughput decrease of 9.21% AODV protocol for the single and collaborative black hole
and 13.38% for the AODV and DSR protocols, respectively, attack were 1.72% and 1.88%, respectively.
compared to the no attack scenario. This decline was caused The packet loss of the AODV was smaller than the DSR
by black hole attacks that were carried out in groups, which routing protocol. In DSR, the packet losses for the single and
resulted in a significant decrease in throughput. collaborative black hole attack were 2.16% and 6.06%, respec-
7.00% [8] J. Kumar, M. Kulkarni, and D. Gupta, ”Effect of Black Hole Attack
6.06% on MANET Routing Protocols,” International Journal of Computer
6.00% Network and Information Security, vol. 5, no. 5, pp. 64–72, 2013.
[9] A. Kumar B R, L. C. Reddy, and P. S. Hiremath, ”Performance
Packet Loss Ra!o (%)

5.00% Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols,”


4.00%
International Journal of Computer Science and Network Security, vol.
8, no. 6, pp. 337–343, 2008.
3.00% [10] J. J.-N. Liu and I. Chlamtac, ”Mobile Ad Hoc Networking with A
2.16% View of 4G Wireless: Imperatives and Challenges,” in Mobile Ad Hoc
1.72% 1.88%
2.00% Networking, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic,
Eds. New Jersey: IEEE Press and Wiley Interscience, 2004, pp. 1–46.
1.00%
0.15% 0.01% [11] S. Puri and V. Arora, ”Performance of MANET: A Review,” Interna-
0.00% tional Journal of Engineering Trends and Technology, vol. 9, no. 11,
Scenario 1 Scenario 2 Scenario 3 pp. 544–549, 2014.
[12] Usha and Bose, ”Comparing the Impact of Black Hole and Gray Hole
AODV DSR
Attacks in Mobile Adhoc Networks,” Journal Computer Science, vol. 8,
no. 11, pp. 1788–1802, 2012.
[13] C. Lohi and S.K Sharma, ”A Survey of Mitigation Techniques to Black
Fig. 7. Packet Loss Ratio results
Hole Attack and Gray Hole Attack in MANET,” International Journal
Computer Technology & Application, vol. 5, no. April, pp. 560–566,
2014.
tively. However, even though AODV and DSR experienced a [14] S. Lalar and A. K. Yadav, ”Comparative Study of Routing Protocols in
packet loss, the values were still in the good category. Packet MANET,” Oriental Journal of Computer Science and Technology, vol.
10, no. 1, pp. 174–179, 2017.
loss that occurred in these two protocols was caused by the [15] M. Medadian, K. Fardad, and A. Mebadi, ”Proposing a Method to
nature of the black hole node that holds the packet and then Remove Gray Hole Attack in AODV Protocol in MANET,” International
discards it when the network is active. Journal of Engineering Science and Innovative Technology, vol. 2, no.
6, pp. 512–518, 2013.
IV. C ONCLUSIONS [16] ETSI, ”Telecommunication and Internet Protocol Harmonization Over
Network (TIPHON): General Aspects of Quality of Service (QoS),”
The study tried to find out the effects of black hole attacks ETSI, vol. 2.1.1, pp. 1–37, 1999.
on the performance of AODV and DSR routing protocols. The
QoS parameters that were used to analyze the performance of
both routing protocols were throughput, delay, and packet loss
ratio. The AODV routing protocol showed smaller throughput
value decrease if compared to the DSR routing protocol when
exposed with single and collaborative black hole attacks.
Furthermore, the DSR routing protocol experienced larger
packet loss when collaborative black hole attack occurs if
compared to the AODV routing protocol. This means that the
AODV is more suitable to be used as the routing protocols on
MANET networks, especially when the MANET network is
hit by a black hole.
R EFERENCES
[1] R. R. Roy, ”Mobile Ad Hoc Networks,” in Handbook of Mobile Ad Hoc
Networks for Mobility Models, London: Springer, 2011, pp. 3–22.
[2] X. Li, ”Topology Control in Wireless Ad Hoc Networks,” in Mobile Ad
Hoc Networking, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic,
Eds. New Jersey: IEEE Press and Wiley Interscience, 2004, pp. 175–205.
[3] S. K. Sarkar, T. . Basavaraju, and C. Puttamadappa, ”Routing Protocols
for Ad Hoc Wireless Networks,” in Ad Hoc Mobile Wireless Networks:
Principles, Protocols, and Applications, New York: Auerbach Publica-
tion, 2008, pp. 59–114.
[4] A. N. Thakare and M. Y. Joshi, ”Performance Analysis of AODV & DSR
Routing Protocol in Mobile Ad Hoc Networks,” Internation Journal of
Computer Applications: Special Issue on MANETs, no. 4, pp. 211–218,
2010.
[5] A. M. Kanthe, D. Simunic, and R. Prasad, ”Comparison of AODV and
DSR On-Demand Routing Protocols in Mobile Ad Hoc Networks ,” 1st
International Conference on Emerging Technology Trends in Electronics
Communication and Networking (ET2ECN), pp. 1–5, 2012.
[6] E. Fazeldehkordi, I. S. Amiri, and O. A. Akanbi, A Study of Black Hole
Attack Solutions: On AODV Routing Protocol in MANET, no. March.
Syngress Elsevier, 2016.
[7] A. A. Chavan, D. S. Kurule, P. U. Dare, ”Performance Analysis of
AODV and DSDV Routing Protocol in MANET and Modifications in
AODV against Black Hole Attack,” 7th International Conference on
Communication, Computing and Virtualization 2016, Procedia Computer
Science vol. 79, pp. 835-844, 2016.

S-ar putea să vă placă și